Gentoo Logo

nbd: Multiple vulnerabilities


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201206-35 / nbd
Release Date June 25, 2012
Latest Revision June 25, 2012: 1
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
sys-block/nbd < 2.9.22 >= 2.9.22 All supported architectures

Related bugreports: #353097, #372891


Multiple vulnerabilities were found in nbd, which could lead to remote execution of arbitrary code.

2.  Impact Information


nbd is a userland client/server for kernel network block device.


Multiple vulnerabilities have been discovered in nbd. Please review the CVE identifiers referenced below for details.


nbd allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or the execution of arbitrary code.

3.  Resolution Information


There is no known workaround at this time.


All nbd users should upgrade to the latest version:

Code Listing 3.1: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=sys-block/nbd-2.9.22"

4.  References


Page updated June 25, 2012

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.